AU5457699A - A technique for producing privately authenticatable cryptographic signatures and for using such a signature in conjunction with a product copy - Google Patents

A technique for producing privately authenticatable cryptographic signatures and for using such a signature in conjunction with a product copy

Info

Publication number
AU5457699A
AU5457699A AU54576/99A AU5457699A AU5457699A AU 5457699 A AU5457699 A AU 5457699A AU 54576/99 A AU54576/99 A AU 54576/99A AU 5457699 A AU5457699 A AU 5457699A AU 5457699 A AU5457699 A AU 5457699A
Authority
AU
Australia
Prior art keywords
signature
key
message
technique
authentic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU54576/99A
Inventor
Peter L. Montgomery
Ramarathnam R. Venkatesan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Corp
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US09/102,948 external-priority patent/US6209093B1/en
Priority claimed from US09/102,851 external-priority patent/US6163841A/en
Application filed by Microsoft Corp filed Critical Microsoft Corp
Publication of AU5457699A publication Critical patent/AU5457699A/en
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
    • G06F2211/008Public Key, Asymmetric Key, Asymmetric Encryption

Abstract

A technique for generating, for a given message to be signed, an authentic cryptographic signature that can be authenticated, by a recipient of the signed message, as having originated from a signor of the message; and appropriately authenticating such a signature. Specifically, this technique, given a message, such as, e.g., a numerical product copy identifier (83, 93), forms an authentic signature (87, 97), based on public-key cryptosystem, through use of generator value selected from points on an elliptic curve over a finite field. The authentic signature is generated using the generator value in conjunction with three keys; namely, a public key, a private key and a secret key, and thus substantially increases the security associated with cryptographic signatures generated through a conventional two-key public-key cryptosystem. A unique product copy indicia can be formed by concatenating the identifier, for a given product copy, with its corresponding authentic signature. During subsequent user installation of that copy to a computer (200), the user enters the indicia when prompted by execution of an installation program which, in turn, privately authenticates the signature contained in the indicia in order to continue or prematurely terminate the installation.
AU54576/99A 1998-06-23 1999-06-23 A technique for producing privately authenticatable cryptographic signatures and for using such a signature in conjunction with a product copy Abandoned AU5457699A (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US09102948 1998-06-23
US09102851 1998-06-23
US09/102,948 US6209093B1 (en) 1998-06-23 1998-06-23 Technique for producing a privately authenticatable product copy indicia and for authenticating such an indicia
US09/102,851 US6163841A (en) 1998-06-23 1998-06-23 Technique for producing privately authenticatable cryptographic signatures and for authenticating such signatures
PCT/US1999/014215 WO1999067920A1 (en) 1998-06-23 1999-06-23 A technique for producing privately authenticatable cryptographic signatures and for using such a signature in conjunction with a product copy

Publications (1)

Publication Number Publication Date
AU5457699A true AU5457699A (en) 2000-01-10

Family

ID=26799803

Family Applications (1)

Application Number Title Priority Date Filing Date
AU54576/99A Abandoned AU5457699A (en) 1998-06-23 1999-06-23 A technique for producing privately authenticatable cryptographic signatures and for using such a signature in conjunction with a product copy

Country Status (7)

Country Link
EP (1) EP1088420B1 (en)
JP (1) JP4644368B2 (en)
CN (2) CN1264305C (en)
AT (1) ATE361605T1 (en)
AU (1) AU5457699A (en)
DE (1) DE69935980T2 (en)
WO (1) WO1999067920A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103081398B (en) * 2010-03-31 2016-04-06 爱迪德技术有限公司 For the protection of the system and method that password assets are attacked from white box

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5271061A (en) * 1991-09-17 1993-12-14 Next Computer, Inc. Method and apparatus for public key exchange in a cryptographic system
JP2868104B2 (en) * 1992-07-27 1999-03-10 日本電信電話株式会社 Digital signature method based on elliptic curve, signer device and verifier device
US5299262A (en) * 1992-08-13 1994-03-29 The United States Of America As Represented By The United States Department Of Energy Method for exponentiating in cryptographic systems
JP3540477B2 (en) * 1995-12-13 2004-07-07 松下電器産業株式会社 Signature scheme
US5638447A (en) * 1996-05-15 1997-06-10 Micali; Silvio Compact digital signatures
US5737424A (en) * 1996-06-04 1998-04-07 Software Security, Inc. Method and system for secure distribution of protected data using elliptic curve systems
US6279110B1 (en) * 1997-11-10 2001-08-21 Certicom Corporation Masked digital signatures

Also Published As

Publication number Publication date
JP4644368B2 (en) 2011-03-02
CN1534922A (en) 2004-10-06
WO1999067920A1 (en) 1999-12-29
DE69935980D1 (en) 2007-06-14
DE69935980T2 (en) 2008-01-10
EP1088420A1 (en) 2001-04-04
EP1088420B1 (en) 2007-05-02
CN1306714A (en) 2001-08-01
CN1264305C (en) 2006-07-12
JP2002519723A (en) 2002-07-02
ATE361605T1 (en) 2007-05-15
CN100334831C (en) 2007-08-29

Similar Documents

Publication Publication Date Title
US9503261B2 (en) Public key encryption with digital signature scheme
ATE211870T1 (en) SECRET KEY CERTIFICATES
MX9602773A (en) Cryptographic system and method with key escrow feature.
US20070199071A1 (en) Apparatus and method for identity-based encryption within a conventional public-key infrastructure
IL139520A0 (en) Efficient distributed rsa key generation
WO2007027241A3 (en) Multi-key cryptographically generated address
HUP0002700A3 (en) Auto-recoverable auto-certifiable cryptosystems
TWI268688B (en) System and method for acoustic two factor authentication
WO1996034473A3 (en) A multi-purpose high speed cryptographically secure sequence generator based on zeta one-way functions
JPH07191602A (en) Electronic autographing method and device
AU3144101A (en) Consumable authentication protocol and system
WO2002013445A3 (en) Linking public key of device to information during manufacture
MY118736A (en) Scheme for authentication of at least one prover by a verifier
GB2342022A (en) Split-key cryptographic system and method
AU2003264906A1 (en) System and method for guaranteeing software integrity
WO2001084766A3 (en) System and method for encryption using transparent keys
Joye et al. Identity-based signatures
KR100396740B1 (en) Provably secure public key encryption scheme based on computational diffie-hellman assumption
AU5457699A (en) A technique for producing privately authenticatable cryptographic signatures and for using such a signature in conjunction with a product copy
EP0973293A3 (en) Public-key cryptography with increased protection against selective ciphertext attack
AU2422499A (en) Key management system
EP1944906A3 (en) Robust efficient distributed RSA-key generation
KR100698514B1 (en) A procesing method and a computer program product effective CRL
CA2541728C (en) Public key encryption with digital signature scheme
KR100412540B1 (en) Security system having a certificate revocation mechanisim

Legal Events

Date Code Title Description
MK6 Application lapsed section 142(2)(f)/reg. 8.3(3) - pct applic. not entering national phase